| 2009 |
| 67 | EE | Sumit Gulwani,
Saurabh Srivastava,
Ramarathnam Venkatesan:
Constraint-Based Invariant Inference over Predicate Abstraction.
VMCAI 2009: 120-135 |
| 2008 |
| 66 | EE | Dimitar Jetchev,
Ramarathnam Venkatesan:
Bits Security of the Elliptic Curve Diffie-Hellman Secret Keys.
CRYPTO 2008: 75-92 |
| 65 | EE | Matthias Jacob,
Mariusz H. Jakubowski,
Prasad Naldurg,
Chit Wei Saw,
Ramarathnam Venkatesan:
The Superdiversifier: Peephole Individualization for Software Protection.
IWSEC 2008: 100-120 |
| 64 | EE | Matthew Cary,
Matthias Jacob,
Mariusz H. Jakubowski,
Ramarathnam Venkatesan:
The Long-Short-Key Primitive and Its Applications to Key Security.
IWSEC 2008: 279-297 |
| 63 | EE | Sumit Gulwani,
Saurabh Srivastava,
Ramarathnam Venkatesan:
Program analysis as constraint solving.
PLDI 2008: 281-292 |
| 62 | EE | Stephen D. Miller,
Ramarathnam Venkatesan:
Non-degeneracy of Pollard Rho Collisions
CoRR abs/0808.0469: (2008) |
| 2007 |
| 61 | EE | Nathan Keller,
Stephen D. Miller,
Ilya Mironov,
Ramarathnam Venkatesan:
MV3: A New Word Based Stream Cipher Using Rapid Mixing and Revolving Buffers.
CT-RSA 2007: 1-19 |
| 60 | EE | Avinash V. Varadarajan,
Ramarathnam Venkatesan,
C. Pandu Rangan:
Data structures for limited oblivious execution of programs while preserving locality of reference.
Digital Rights Management Workshop 2007: 63-69 |
| 59 | EE | Mariusz H. Jakubowski,
Ramarathnam Venkatesan:
Randomized radon transforms for biometric authentication via fingerprint hashing.
Digital Rights Management Workshop 2007: 90-94 |
| 58 | EE | Srivatsan Laxman,
Prasad Naldurg,
Raja Sripada,
Ramarathnam Venkatesan:
Connections between Mining Frequent Itemsets and Learning Generative Models.
ICDM 2007: 571-576 |
| 57 | EE | David Jao,
Dimitar Jetchev,
Ramarathnam Venkatesan:
On the Bits of Elliptic Curve Diffie-Hellman Keys.
INDOCRYPT 2007: 33-47 |
| 56 | EE | Bertrand Anckaert,
Mariusz H. Jakubowski,
Ramarathnam Venkatesan,
Koen De Bosschere:
Run-Time Randomization to Mitigate Tampering.
IWSEC 2007: 153-168 |
| 55 | EE | Nenad Dedic,
Mariusz H. Jakubowski,
Ramarathnam Venkatesan:
A Graph Game Model for Software Tamper Protection.
Information Hiding 2007: 80-95 |
| 54 | EE | Mariusz H. Jakubowski,
Prasad Naldurg,
Vijay Patankar,
Ramarathnam Venkatesan:
Software Integrity Checking Expressions (ICEs) for Robust Tamper Detection.
Information Hiding 2007: 96-111 |
| 53 | EE | Matthias Jacob,
Mariusz H. Jakubowski,
Ramarathnam Venkatesan:
Towards integral binary execution: implementing oblivious hashing using overlapped instruction encodings.
MM&Sec 2007: 129-140 |
| 52 | EE | David Jao,
S. Ramesh Raju,
Ramarathnam Venkatesan:
Digit Set Randomization in Elliptic Curve Cryptography.
SAGA 2007: 105-117 |
| 51 | EE | Debapratim De,
Abishek Kumarasubramanian,
Ramarathnam Venkatesan:
Inversion Attacks on Secure Hash Functions Using satSolvers.
SAT 2007: 377-382 |
| 2006 |
| 50 | EE | Stephen D. Miller,
Ramarathnam Venkatesan:
Spectral Analysis of Pollard Rho Collisions.
ANTS 2006: 573-581 |
| 49 | EE | Bertrand Anckaert,
Mariusz H. Jakubowski,
Ramarathnam Venkatesan:
Proteus: virtualization for diversified tamper-resistance.
Digital Rights Management Workshop 2006: 47-58 |
| 48 | EE | Nathan Keller,
Stephen D. Miller,
Ilya Mironov,
Ramarathnam Venkatesan:
MV3: A new word based stream cipher using rapid mixing and revolving buffers
CoRR abs/cs/0610048: (2006) |
| 47 | EE | Stephen D. Miller,
Ramarathnam Venkatesan:
Spectral Analysis of Pollard Rho Collisions
CoRR abs/math/0603727: (2006) |
| 2005 |
| 46 | | Subhamoy Maitra,
C. E. Veni Madhavan,
Ramarathnam Venkatesan:
Progress in Cryptology - INDOCRYPT 2005, 6th International Conference on Cryptology in India, Bangalore, India, December 10-12, 2005, Proceedings
Springer 2005 |
| 45 | EE | Michael Malkin,
Ramarathnam Venkatesan:
Comparison of Texts Streams in the Presence of Mild Adversaries.
ACSW Frontiers 2005: 179-186 |
| 44 | EE | David Jao,
Stephen D. Miller,
Ramarathnam Venkatesan:
Do All Elliptic Curves of the Same Order Have the Same Difficulty of Discrete Log?
ASIACRYPT 2005: 21-40 |
| 43 | | Mehmet Kucukgoz,
Oztan Harmanci,
Mehmet Kivanç Mihçak,
Ramarathnam Venkatesan:
Robust video watermarking via optimization algorithm for quantization of pseudo-random semi-global statistics.
Security, Steganography, and Watermarking of Multimedia Contents 2005: 363-369 |
| 42 | EE | Mustafa Kesal,
Mehmet Kivanç Mihçak,
Ramarathnam Venkatesan:
An improved attack analysis on a public-key spread spectrum watermarking.
Multimedia Syst. 11(2): 133-142 (2005) |
| 41 | EE | Mehmet Kivanç Mihçak,
Ramarathnam Venkatesan,
Tie Liu:
Watermarking via optimization algorithms for quantizing randomized semi-global image statistics.
Multimedia Syst. 11(2): 185-200 (2005) |
| 2004 |
| 40 | | Suleyman Serdar Kozat,
Ramarathnam Venkatesan,
Mehmet Kivanç Mihçak:
Robust perceptual image hashing via matrix invariants.
ICIP 2004: 3443-3446 |
| 39 | EE | Tie Liu,
Ramarathnam Venkatesan,
Mehmet Kivanç Mihçak:
Scale-invariant image watermarking via optimization algorithms for quantizing randomized statistics.
MM&Sec 2004: 124-132 |
| 38 | EE | Mustafa Kesal,
Mehmet Kivanç Mihçak,
Ramarathnam Venkatesan:
An improved attack analysis on a public-key spread spectrum watermarking.
MM&Sec 2004: 41-45 |
| 37 | EE | David Jao,
Stephen D. Miller,
Ramarathnam Venkatesan:
Ramanujan Graphs and the Random Reducibility of Discrete Log on Isogenous Elliptic Curves
CoRR math.NT/0411378: (2004) |
| 2003 |
| 36 | EE | Matthew Cary,
Ramarathnam Venkatesan:
A Message Authentication Code Based on Unimodular Matrix Groups.
CRYPTO 2003: 500-512 |
| 2002 |
| 35 | EE | Jeremy Horwitz,
Ramarathnam Venkatesan:
Random Cayley Digraphs and the Discrete Logarithm.
ANTS 2002: 416-430 |
| 34 | EE | Mehmet Kivanç Mihçak,
Ramarathnam Venkatesan,
Mustafa Kesal:
Cryptanalysis of Discrete-Sequence Spread Spectrum Watermarks.
Information Hiding 2002: 226-246 |
| 33 | EE | Yuqun Chen,
Ramarathnam Venkatesan,
Matthew Cary,
Ruoming Pang,
Saurabh Sinha,
Mariusz H. Jakubowski:
Oblivious Hashing: A Stealthy Software Integrity Verification Primitive.
Information Hiding 2002: 400-414 |
| 32 | EE | Myung M. Bae,
Ramarathnam Venkatesan,
Bella Bose:
Data Rearrangement between Radix-k and Lee Distance Gray Codes in k-ary n-cubes.
J. Parallel Distrib. Comput. 62(1): 19-37 (2002) |
| 2001 |
| 31 | EE | Mehmet Kivanç Mihçak,
Ramarathnam Venkatesan:
New Iterative Geometric Methods for Robust Perceptual Image Hashing.
Digital Rights Management Workshop 2001: 13-21 |
| 30 | EE | Ramarathnam Venkatesan,
Vijay V. Vazirani,
Saurabh Sinha:
A Graph Theoretic Approach to Software Watermarking.
Information Hiding 2001: 157-168 |
| 29 | EE | Mehmet Kivanç Mihçak,
Ramarathnam Venkatesan:
A Perceptual Audio Hashing Algorithm: A Tool for Robust Audio Identification and Information Hiding.
Information Hiding 2001: 51-65 |
| 28 | EE | Leonid A. Levin,
Ramarathnam Venkatesan:
An Average Case NP-complete Graph Problem
CoRR cs.CC/0112001: (2001) |
| 2000 |
| 27 | | Ramarathnam Venkatesan,
Mariusz H. Jakubowski:
Image Watermarking with Better Resilience.
ICIP 2000 |
| 26 | | Ramarathnam Venkatesan,
S.-M. Koon,
Mariusz H. Jakubowski,
Pierre Moulin:
Robust Image Hashing.
ICIP 2000 |
| 1999 |
| 25 | EE | William Aiello,
Sivaramakrishnan Rajagopalan,
Ramarathnam Venkatesan:
High-Speed Pseudorandom Number Generation with Small Memory.
FSE 1999: 290-304 |
| 1998 |
| 24 | EE | William Aiello,
Mihir Bellare,
Giovanni Di Crescenzo,
Ramarathnam Venkatesan:
Security Amplification by Composition: The Case of Doubly-Iterated, Ideal Ciphers.
CRYPTO 1998: 390-407 |
| 23 | EE | Victor Boyko,
Marcus Peinado,
Ramarathnam Venkatesan:
Speeding up Discrete Log and Factoring Based Schemes via Precomputations.
EUROCRYPT 1998: 221-235 |
| 22 | EE | Mariusz H. Jakubowski,
Ramarathnam Venkatesan:
The Chain & Sum Primitive and Its Applications to MACs and Stream Ciphers.
EUROCRYPT 1998: 281-293 |
| 21 | EE | Dan Boneh,
Ramarathnam Venkatesan:
Breaking RSA May Not Be Equivalent to Factoring.
EUROCRYPT 1998: 59-71 |
| 20 | EE | William Aiello,
Stuart Haber,
Ramarathnam Venkatesan:
New Constructions for Secure Hash Functions.
FSE 1998: 150-167 |
| 19 | EE | William Aiello,
Mihir Bellare,
Giovanni Di Crescenzo,
Ramarathnam Venkatesan:
Security amplification by composition: The case of doubly-iterated ideal ciphers
CoRR cs.CR/9809031: (1998) |
| 18 | | William Aiello,
Sivaramakrishnan Rajagopalan,
Ramarathnam Venkatesan:
Design of Practical and Provably Good Random Number Generators.
J. Algorithms 29(2): 358-389 (1998) |
| 17 | EE | Moni Naor,
Rafail Ostrovsky,
Ramarathnam Venkatesan,
Moti Yung:
Perfect Zero-Knowledge Arguments for NP Using Any One-Way Permutation.
J. Cryptology 11(2): 87-108 (1998) |
| 1997 |
| 16 | | Marcus Peinado,
Ramarathnam Venkatesan:
Highly Parallel Cryptographic Attacks.
PVM/MPI 1997: 367-374 |
| 15 | | Dan Boneh,
Ramarathnam Venkatesan:
Rounding in Lattices and its Cryptographic Applications.
SODA 1997: 675-681 |
| 14 | | Sulaiman Al-Bassam,
Ramarathnam Venkatesan,
Sultan Al-Muhammadi:
New single asymmetric error-correcting codes.
IEEE Transactions on Information Theory 43(5): 1619-1623 (1997) |
| 1996 |
| 13 | EE | Dan Boneh,
Ramarathnam Venkatesan:
Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes.
CRYPTO 1996: 129-142 |
| 12 | EE | William Aiello,
Ramarathnam Venkatesan:
Foiling Birthday Attacks in Length-Doubling Transformations - Benes: A Non-Reversible Alternative to Feistel.
EUROCRYPT 1996: 307-320 |
| 1995 |
| 11 | | William Aiello,
Sivaramakrishnan Rajagopalan,
Ramarathnam Venkatesan:
Design of Practical and Provably Good Random Number Generators (Extended Abstract).
SODA 1995: 1-9 |
| 10 | | Dennis Grinberg,
Sivaramakrishnan Rajagopalan,
Ramarathnam Venkatesan,
Victor K. Wei:
Splay Trees for Data Compression.
SODA 1995: 522-530 |
| 9 | EE | William Aiello,
Mihir Bellare,
Ramarathnam Venkatesan:
Knowledge on the average-perfect, statistical and logarithmic.
STOC 1995: 469-478 |
| 1994 |
| 8 | | William Aiello,
Ramarathnam Venkatesan,
Moti Yung:
Coins, Weights and Contention in Balancing Networks.
PODC 1994: 193-205 |
| 1993 |
| 7 | EE | Rafail Ostrovsky,
Ramarathnam Venkatesan,
Moti Yung:
Interactive Hashing Simplifies Zero-Knowledge Protocol Design.
EUROCRYPT 1993: 267-273 |
| 1992 |
| 6 | EE | Moni Naor,
Rafail Ostrovsky,
Ramarathnam Venkatesan,
Moti Yung:
Perfect Zero-Knowledge Arguments for NP Can Be Based on General Complexity Assumptions (Extended Abstract).
CRYPTO 1992: 196-214 |
| 5 | | Rafail Ostrovsky,
Ramarathnam Venkatesan,
Moti Yung:
Secure Commitment Against A Powerful Adversary.
STACS 1992: 439-448 |
| 4 | | Ramarathnam Venkatesan,
Sivaramakrishnan Rajagopalan:
Average Case Intractability of Matrix and Diophantine Problems (Extended Abstract)
STOC 1992: 632-642 |
| 1991 |
| 3 | | Sulaiman Al-Bassam,
Bella Bose,
Ramarathnam Venkatesan:
Burst and Unidirectional Error Detecting Codes.
FTCS 1991: 378-384 |
| 1990 |
| 2 | | Oded Goldreich,
Russell Impagliazzo,
Leonid A. Levin,
Ramarathnam Venkatesan,
David Zuckerman:
Security Preserving Amplification of Hardness
FOCS 1990: 318-326 |
| 1988 |
| 1 | | Ramarathnam Venkatesan,
Leonid A. Levin:
Random Instances of a Graph Coloring Problem Are Hard
STOC 1988: 217-222 |